This role will lead a cross-functional team spanning Incident Response, Threat Intelligence, Threat Hunting, Red Teaming, and Attack Surface Management (ASM), working closely with other security domains and technology teams to drive measurable reduction in cyber risk.. Build and mature proactive threat hunting and intel programs using telemetry from SIEM, EDR, ASM, and external threat feeds.. Manage red team and penetration testing efforts (internal and third-party), simulating adversary behaviors to identify vulnerabilities and resilience gaps in people, process, and technology.. Deep understanding of threat actor tactics (MITRE ATT&CK, kill chain, etc.). Experience with EDR, SIEM, ASM, SOAR, and threat intel platforms (e.g., CrowdStrike, Splunk, Wiz, Mandiant, Recorded Future)
Discover a career in banking at Fifth Third Bank. GENERAL FUNCTIONThe Director, Threat Intelligence and Threat Emulation, reporting to the Sr. Vice President Cybersecurity Threat Interdiction will have responsibility for creating and implementing the strategic goals and objectives of the Threat Intel and Threat Emulation Team, and people management.. The position will also be responsible for the management of cybersecurity threat emulation operations to effectively test of and collect learnings for the detection and response capabilities of the Intel and DART teams.. Knowledge or experience related to management of cyber defense and/or cyber intelligence operations.. Knowledge of cyber defense technologies such as DLP, SIEM, TIP, IDS/IPS, Advanced Malware Detection, etc. Preferred CISSP, GIAC, or CISM certification.
Participate in system audits and perform testing for disaster recovery or SOX controls, ensuring a secure processing environment that protects the integrity and availability of the managed systems. Experience with network hardware, including routers, switches, firewalls, and VPN appliances (e.g., Aruba Networks, Juniper Mist, Palo Alto Networks). Proficiency in network security practices and technologies (e.g., IDS/IPS, NAC, SSL, IPsec). Experience with virtualization technologies (e.g., VMware, Hyper-V) and cloud networking (e.g., AWS, Azure). Proficiency in scripting languages (e.g., Python, Perl, Bash) for network automation.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process. 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering;.. Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis;.. Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH
Division Manager @ Daley And Associates | IT Staffing, Permanent Placement and Executive Search.. No relocation assistance provided. Monitor security incidents, investigate threats, and lead incident response. Expertise in network security, cloud security, identity management, and encryption. Proficiency in security tools (SIEM, vulnerability management, incident response).
In support of this, we are looking for a leader for our Cyber Intelligence team whose mission is to leverage cyber threat intelligence for good, to counter, disrupt and mitigate cyber adversaries targeting Capital One customers, associates, infrastructure and brand.. Create mechanisms to "connects the dots" between different spaces in order to highlight cyber threats across fraud, cybercrime and advanced threat activities. At least 9 years of experience working in cybersecurity or information technology performing incident response, threat hunting, threat intelligence, forensics, or offensive security. Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), AWS Certification, or Certified Fraud Examiner (CFE) certification. This role is also eligible to earn performance based incentive compensation, which may include cash bonus(es) and/or long term incentives (LTI).
We are seeking a highly skilled Network Security Engineer to join our growing IT security team in London. Proficiency in configuring and managing security technologies such as Cisco ASA, Palo Alto, Fortinet, or Check Point firewalls. Hands-on experience in incident response, threat hunting, and forensic analysis. Professional certifications such as CISSP, CISM, CEH, CCNP Security, or equivalent. Experience with cloud security in AWS, Azure, or Google Cloud.
Network Security Engineer (Public Trust Clearance).. Identify and manage projects related to IT security and overall enterprise operations and maintenance, to include the task delegation and status reporting while coordinating activities within the Network and Systems teams and across the IMT department. Analyzes and reviews IT and physical security events, and traffic flows escalated from automated detection systems utilizing commercial Security Incident and Event Management (SIEM [Tripwire software]), Intrusion Detection and Prevention Systems (IDS/IPS [Palo Alto, Cisco ASA, McAfee, Ironport software]) and log management and database activity monitoring. Possesses recent (within 1 year) and relevant practical experience using Retina, Gold Disk, Wireshark, Snort, Logger, Nessus, NeXpose, Metasploit, and other security and web assessment tools. Possesses experience building and maintaining System Security Plans, Incident Response Plans, Contingency Plans and Exercises, Continuity of Operations Plans and exercises, Risk Management Plans and Vulnerability Management Plans in accordance with FISMA, and NIST guidelines.
Collaborate with MDR and SIEM partners to manage and resolve security incidents.. Strong foundation in cybersecurity, including IAM, data protection, and incident response.. Experience with Microsoft Defender, MS365 Intune MDM, and Microsoft Sentinel.. Hands-on experience with platforms such as Azure Sentinel, Tenable Nessus, BeyondTrust (Bomgar), Mimecast, Palo Alto Networks, Burp Suite, Pentera, and Kali Linux.. Cybersecurity certifications such as Security+, CEH, Cybersecurity Analyst+, GIAC, Cisco CyberOps, or Microsoft Security.
As a Security Engineer, Application Security you will be responsible for identifying and mitigating security vulnerabilities within software applications through building security tools, code reviews, penetration testing, and security assessments. Perform Security Assessments: Conduct regular security assessments, code reviews, and penetration testing to identify vulnerabilities in applications and software. Vulnerability Management: Track, analyze, and manage vulnerabilities in applications, providing guidance and support for remediation efforts. Deep understanding of security technologies, tools, and best practices, including experience with secure coding practices, threat modeling, risk assessments, and incident response. OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.
As a Lead Cybersecurity Architect at JPMorgan Chase within the Consumer Community Banking Digital / Customer Acquisition and Marketing Platforms Line of business, youare an integral part of a team that works to develop high-quality cybersecurity solutions for various software applications on modern cloud-based technologies.. Demonstrated proficiency in software applications and technical processes within a technical discipline (e.g., public cloud, artificial intelligence, machine learning, mobile, etc.). A deep understanding of cloud security architecture (AWS), security protocols, cryptography, authentication, authorization, vulnerabilities, and remediation techniques.. Demonstrated knowledge of application security, network security, IT risk management, and architectural concepts and patterns.. Familiarity with modern front-end technologies (React, Javascript etc
Our Mission Services division combines enterprise IT, cloud solutions, DevSecOps, systems engineering, software development, and operational support.. Responsibilities include but are not limited to: Design and champion the strategy for detecting and responding to cyber incidents within Oracle Cloud Infrastructure (OCI) or Google Cloud Platform (GCP). 3+ years' experience architecting, engineering, implementing, or securing solutions within Google Cloud Platform (GCP) OR Oracle Cloud Infrastructure (OCI). Experience with cloud security principles, including identity and access management, network security, and data protection within the chosen platform (GCP or OCI) Desired Qualifications Degree in Computer Science, Information Security, or a related technical field Relevant Certifications such as CISSP, CCSP, CCSK, GCFA, GCIH, or cloud–specific security certifications (e.g., Google Cloud Security Engineer, Oracle Cloud Security Architect). Experience in security services and best practices within either Google Cloud Platform (GCP Security Command Center, Chronicle, IAM, Networking) OR Oracle Cloud Infrastructure (OCI Cloud Guard, Security Zones, IAM, Networking)
We use advanced cryptography called zero-knowledge proofs to scale Ethereum infinitely without compromising on security or decentralization. Oversee vulnerability management, detection, and incident response. Hands-on experience with threat modeling, penetration testing, intrusion detection, and forensics. or Golang - Rust is preferred, but not required. Experience working in blockchain or zero-knowledge proof-based systems.
We use advanced cryptography called zero-knowledge proofs to scale Ethereum infinitely without compromising on security or decentralization. Oversee vulnerability management, detection, and incident response. Hands-on experience with threat modeling, penetration testing, intrusion detection, and forensics. or Golang - Rust is preferred, but not required. Experience working in blockchain or zero-knowledge proof-based systems.
Digital Consultants is seeking a Cybersecurity Engineer with strong systems and network engineering experience to support Counter-UAS and traditional Airspace Security networks and systems for a sponsor in Washington, DC. The ideal candidate is a hands-on practitioner with deep technical expertise in configuring, securing, and managing critical infrastructure in high-security environments.. Clearance: Top Secret/SCI. Ten (10) years of experience implementing and maintaining cybersecurity control requirements, including system hardening, vulnerability assessment, and incident response.. Hands-on experience with Cisco network infrastructure, Windows OS environments, and cybersecurity compliance processes (e.g., ATO).. Experience may include plan, implement, upgrade, and/or monitor cybersecurity measures to improve cyber defense and maintain a cyber-resilient network; assess cybersecurity vulnerabilities for risks and propose and implement remediation actions or risk mitigation strategies; ensure appropriate security controls are in place that will safeguard digital files and electronic infrastructure; and respond to computer security breaches to re-establish protections and make required reports.
Whether a customer wants to grow their business, buy a home, or feel confident in their retirement plan, they have a partner in Ameris Bank. We serve customers in our locations across the Southeast, Mid-Atlantic and nationwide through our extensive digital offerings and mobile app.. Lead the design and implementation of the organization's cybersecurity architecture, covering areas such as network security, cloud security, endpoint security, data protection, IAM and application security.. Evaluate and recommend security technologies, tools, and services to enhance the organization's security posture, including SIEM, IDS/IPS, firewalls, and endpoint protection.. Strong knowledge of cloud security (AWS, Azure, M365, SaaS) and traditional IT infrastructure.. Expert understanding of identity governance & administration concepts and solutions, identity & access management systems and processes.
We use advanced cryptography called zero-knowledge proofs to scale Ethereum infinitely without compromising on security or decentralization. Oversee vulnerability management, detection, and incident response. Hands-on experience with threat modeling, penetration testing, intrusion detection, and forensics. or Golang - Rust is preferred, but not required. Experience working in blockchain or zero-knowledge proof-based systems.
Drive impact with innovative security solutions for digital transformation. They are currently looking to bolster their security and compliance capabilities, focusing on data protection, governance, and risk management in line with modern cybersecurity frameworks.. Deploy, configure and manage Microsoft Purview solutions including data loss prevention, Information Protection, Insider Risk Management, and eDiscovery. Proven skills in managing Microsoft Purview solutions, including DLP and information protection. Develop expertise in data governance and Zero Trust security models
Object Technology Solutions, Inc (OTSI) has an immediate opening for a Global IT Cyber Security Manager. Global IT Cyber Security Manager- (Hybrid - Houston, TX). The Global IT Cyber Security Manager is responsible for developing, implementing, and managing a robust cybersecurity program aligned with the NIST Cybersecurity Framework and defense-in-depth methodology.. Configure port security, DHCP snooping, and dynamic ARP inspection to prevent MAC flooding, rogue device access, and layer-2 attacks. OTSI works with 100+ enterprise customers, of which many are Fortune ranked, OTSI focuses on industry segments such as Banking, Financial Services & Insurance, Healthcare & Life Sciences, Energy & Utilities, Communications & Media Entertainment, Engineering & Telecom, Retail & Consumer Services, Hi-tech, Manufacturing, Engineering, transport logistics, Government, Defence & PSUs.
Junior Network Administrator. Hybrid with 3 days a week onsite.. Support incident response efforts by identifying, analyzing, and escalating potential security threats. Perform basic vulnerability scans and support patch management. Microsoft 365, Cisco and/or Fortinet experience would be a plus